Vulnerability Description
Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Snort | Snort | <= 2.6.1.2 |
| Sourcefire | Intrusion Sensor | 4.1 |
References
- http://fedoranews.org/updates/FEDORA-2007-206.shtml
- http://iss.net/threats/257.htmlVendor Advisory
- http://secunia.com/advisories/24190
- http://secunia.com/advisories/24235
- http://secunia.com/advisories/24239
- http://secunia.com/advisories/24240
- http://secunia.com/advisories/24272
- http://secunia.com/advisories/26746
- http://security.gentoo.org/glsa/glsa-200703-01.xml
- http://www.kb.cert.org/vuls/id/196240US Government Resource
- http://www.osvdb.org/32094
- http://www.securityfocus.com/archive/1/461810/100/0/threaded
- http://www.securityfocus.com/bid/22616
- http://www.securitytracker.com/id?1017669
- http://www.securitytracker.com/id?1017670
FAQ
What is CVE-2006-5276?
CVE-2006-5276 is a vulnerability with a CVSS score of 10.0 (HIGH). Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted S...
How severe is CVE-2006-5276?
CVE-2006-5276 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5276?
Check the references section above for vendor advisories and patch information. Affected products include: Snort Snort, Sourcefire Intrusion Sensor.